-
1
-
-
33750447990
-
Deciding knowledge in security protocols under equational theories
-
Abadi, M., Cortier, V.: Deciding knowledge in security protocols under equational theories. Theor. Comp. Sci. 387(1-2), 2-32 (2006)
-
(2006)
Theor. Comp. Sci.
, vol.387
, Issue.1-2
, pp. 2-32
-
-
Abadi, M.1
Cortier, V.2
-
3
-
-
38049162024
-
Intruders with caps
-
Springer
-
Anantharaman, S., Narendran, P., Rusinowitch, M.: Intruders with caps. In: Proc. 18th International Conference on Term Rewriting and Applications (RTA'07). LNCS, vol. 4533. Springer (2007)
-
(2007)
Proc. 18th international conference on term rewriting and applications (rta'07). Lncs
, vol.4533
-
-
Anantharaman, S.1
Narendran, P.2
Rusinowitch, M.3
-
4
-
-
26444497860
-
The avispa tool for the automated validation of internet security protocols and applications
-
Springer
-
Armando, A., et al.: The AVISPA Tool for the automated validation of internet security protocols and applications. In: Proc. 17th Int. Conference on Computer Aided Verification (CAV'05). LNCS, vol. 3576, pp. 281-285. Springer (2005)
-
(2005)
Proc. 17th int. Conference on computer aided verification (cav'05). Lncs
, vol.3576
, pp. 281-285
-
-
Armando, A.1
-
5
-
-
38049084697
-
Combining algorithms for deciding knowledge in security protocols
-
In: Wolter, F. (ed.) Springer, Liverpool, UK (
-
Arnaud, M., Cortier, V., Delaune, S.: Combining algorithms for deciding knowledge in security protocols. In: Wolter, F. (ed.) Proceedings of the 6th International Symposium on Frontiers of Combining Systems (FroCoS'07). Lecture Notes in Artificial Intelligence, vol. 4720, pp. 103-117. Springer, Liverpool, UK (2007)
-
(2007)
Proceedings of the 6th International Symposium on Frontiers of Combining Systems (FroCoS'07). Lecture Notes in Artificial Intelligence
, vol.4720
, pp. 103-117
-
-
Arnaud, M.1
Cortier, V.2
Delaune, S.3
-
10
-
-
70350663117
-
Yapa: A generic tool for computing intruder knowledge
-
Springer, Brasília, Brazil
-
Baudet, M., Cortier, V., Delaune, S.: YAPA: a generic tool for computing intruder knowledge. In: Proc. 20th International Conference on Rewriting Techniques and Applications (RTA'09), Lecture Notes in Computer Science, vol. 5595, pp. 148-163. Springer, Brasília, Brazil (2009)
-
(2009)
Proc. 20th International Conference on Rewriting Techniques and Applications (RTA'09), Lecture Notes in Computer Science
, vol.5595
, pp. 148-163
-
-
Baudet, M.1
Cortier, V.2
Delaune, S.3
-
12
-
-
0034822279
-
An efficient cryptographic protocol verifier based on prolog rules
-
IEEE Computer Society Press
-
Blanchet, B.: An efficient cryptographic protocol verifier based on prolog rules. In: 14th Computer Security Foundations Workshop (CSFW'01), pp. 82-96. IEEE Computer Society Press (2001)
-
(2001)
14th Computer Security Foundations Workshop (CSFW'01)
, pp. 82-96
-
-
Blanchet, B.1
-
13
-
-
26844508455
-
Automated verification of selected equivalences for security protocols
-
IEEE Computer Society Press
-
Blanchet, B., Abadi, M., Fournet, C.: Automated verification of selected equivalences for security protocols. In: Symposium on Logic in Computer Science, pp. 331-340. IEEE Computer Society Press (2005)
-
(2005)
Symposium on Logic in Computer Science
, pp. 331-340
-
-
Blanchet, B.1
Abadi, M.2
Fournet, C.3
-
16
-
-
84897583023
-
-
Ciobâca Ş .: KiSs
-
Ciobâca, Ş .: KiSs. http://www.lsv.ens-cachan.fr/ciobaca/ kiss (2009)
-
(2009)
-
-
-
17
-
-
69949148046
-
Computing knowledge in security protocols under convergent equational theories
-
In: Schmidt, R. (ed.) Springer, Montreal, Canad
-
Ciobâca, Ş ., Delaune, S., Kremer, S.: Computing knowledge in security protocols under convergent equational theories. In: Schmidt, R. (ed.) Proceedings of the 22nd International Conference on Automated Deduction (CADE'09). Lecture Notes in Artificial Intelligence, pp. 355-370, Springer, Montreal, Canada (2009)
-
(2009)
Proceedings of the 22nd International Conference on Automated Deduction (CADE'09). Lecture Notes in Artificial Intelligence, pp.
, pp. 355-370
-
-
Ciobâca, S.1
Delaune, S.2
Kremer, S.3
-
20
-
-
31744441853
-
A survey of algebraic properties used in cryptographic protocols
-
Cortier, V., Delaune, S., Lafourcade, P.: A survey of algebraic properties used in cryptographic protocols. J. Comput. Secur. 14(1), 1-43 (2006)
-
(2006)
J. Comput. Secur.
, vol.14
, Issue.1
, pp. 1-43
-
-
Cortier, V.1
Delaune, S.2
Lafourcade, P.3
-
21
-
-
68249084846
-
Verifying privacy-type properties of electronic voting protocols
-
Delaune, S., Kremer, S., Ryan, M.D.: Verifying privacy-type properties of electronic voting protocols. J. Comput. Secur. 17(4), 435-487 (2009)
-
(2009)
J. Comput. Secur.
, vol.17
, Issue.4
, pp. 435-487
-
-
Delaune, S.1
Kremer, S.2
Ryan, M.D.3
-
22
-
-
23144432349
-
Analysis of an electronic voting protocol in the applied pi-calculus
-
Springer
-
Kremer, S., Ryan, M.D.: Analysis of an electronic voting protocol in the applied pi-calculus. In: 14th European Symposium on Programming (ESOP'05). LNCS, vol. 3444, pp. 186-200. Springer (2005)
-
(2005)
14th european symposium on programming (esop'05). Lncs
, vol.3444
, pp. 186-200
-
-
Kremer, S.1
Ryan, M.D.2
-
23
-
-
84855190787
-
Intruder deduction for the equational theory of abelian groups with distributive encryption
-
Lafourcade, P., Lugiez, D., Treinen, R.: Intruder deduction for the equational theory of Abelian groups with distributive encryption. Inf. Comput. 205(4), 581-623 (2007)
-
(2007)
Inf. Comput.
, vol.205
, Issue.4
, pp. 581-623
-
-
Lafourcade, P.1
Lugiez, D.2
Treinen, R.3
-
25
-
-
0011828723
-
Receipt-free electronic voting schemes for large scale elections
-
Springer
-
Okamoto, T.: Receipt-free electronic voting schemes for large scale elections. In: Proc. 5th Int. Security Protocols Workshop, LNCS, vol. 1361. Springer (1997)
-
(1997)
Proc. 5th int. Security Protocols Workshop LNCS
, vol.1361
-
-
Okamoto, T.1
-
26
-
-
0037453396
-
Protocol insecurity with finite number of sessions and composed keys is np-complete
-
Rusinowitch, M., Turuani, M.: Protocol insecurity with finite number of sessions and composed keys is NP-complete. Theor. Comp. Sci. 299, 451-475 (2003)
-
(2003)
Theor. Comp. Sci.
, vol.299
, pp. 451-475
-
-
Rusinowitch, M.1
Turuani, M.2
|